Which of the following is not part of the LINUX operating system?
Which of the following is not part of the LINUX operating system?A . CentOSB . RedHatC . UbuntuD . MAC OSView AnswerAnswer: D
Which variable should you include when calculating the estimate?
A company plans to use Azure Cosmos DB as the document store for an application. You need to estimate the request units required for the application. Which variable should you include when calculating the estimate?A . collection sizeB . writes per secondC . cache sizeD . consistency levelE . item...
Which of the following statements pertaining to using Kerberos without any extension is false?
Which of the following statements pertaining to using Kerberos without any extension is false?A . A client can be impersonated by password-guessing.B . Kerberos is mostly a third-party authentication protocol.C . Kerberos uses public key cryptography.D . Kerberos provides robust authentication.View AnswerAnswer: C Explanation: Kerberos is a trusted, credential-based, third-party...
Which design change best supports that requirement?
Refer to the exhibit. The branch routers have E1 lines into the Frame Relay Service provider network. The exhibit shows just one branch, but the network actually has 30 branches. The HP 6600 Series routers, which are the area border routers (ABRs), have E2 lines into the Frame Relay network....
Which of the following should the technician do NEXT in the troubleshooting methodology?
A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?A . Document the findings and...
The UPS5000 option temperature and humidity sensor does not support cascading.
The UPS5000 option temperature and humidity sensor does not support cascading.A . TrueB . FalseView AnswerAnswer: B
Which party has a SIP B2BUA role in the call?
Refer to the exhibit. Which party has a SIP B2BUA role in the call?A . 172.17.4.100B . 10.100.4.65 and 172.17.4.100C . 10.100.4.65D . None of the parties has a B2BUA role in the call.E . 10.100.4.68 and 10.100.4.65View AnswerAnswer: C
What mechanism does asymmetric cryptography use to secure data?
What mechanism does asymmetric cryptography use to secure data?A . a public/private key pairB . shared secret keysC . an RSA nonceD . an MD5 hashView AnswerAnswer: A
Which URL should you use to access the list?
You administer an Azure Storage account named contoso storage. The account has queue containers with logging enabled. You need to view all log files generated during the month of July 2014. Which URL should you use to access the list?A . http://contosostorage.queue.core.windows.net/$logs?restype=container&comp=list&prefix=queue/2014/07B . http://contosostorage.queue.core.windows.net/$files?restype=container&comp=list&prefix=queue/2014/07C . http://contosostorage.blob.core.windows.net/$files?restype=container&comp=list&prefix=blob/2014/07D . http://contosostorage.blob.core.windows.net/$logs?restype=container&comp=list&prefix=blob/2014/07View AnswerAnswer: D...
What is the correct procedure?
A company has a two chassis G Series cluster and wants to change the setup. This will require a reset of the chassis. What is the correct procedure?A . Reset both chassis simultaneously through the reset scriptB . Reset the primary chassis first, followed by the secondary chassis, through the...